SNMP-Monitoringv1 07
SNMP-Monitoringv1 07
www.fortinet.com
SNMP
Monitoring
1.
BACKGROUND .....................................................3
INTRODUCTION .....................................................3
SCOPE OF DOCUMENT .................................................3
2.
3.
4.
5.
8.
www.fortinet.com
22
Page | 1
SNMP
Monitoring
Date
Author
Status
1.00
18.10.2012
Alida de Beer
First Draft
1.06
19.02.2013
Martin Adamini
New chapter
1.07
09.07.2014
Sabine Kerjean
www.fortinet.com
Comment
Page | 2
SNMP
Monitoring
1.
Background
Introduction
The purpose of this document is to provide recommendations for SNMP monitoring of Fortinet appliances.
Something to keep in mind is that each network is different. And the use of each device in a network can be
different. The Best Practice will be to create a Baseline for each network device. With a defined base-line one
should start to investigate as soon as there is a deviation of 10% or more from the baseline.
To create this Baseline SNMP monitoring should be done for a long enough period to be able to define
normal behaviour. The period that comes to mind is at least one month but this depends on the network
and the daily variation. The interval between SNMP queries should be in the order of 5 minutes in order to
have updated information without too much strain on the device.
Base-lining is not a static process it should be done with regular intervals and the current Baseline should be
updated.
SNMPv3 has Authorization and Encryption and is more secure than SNMPv1 or v2. The suggestion would be to
use SNMPv3 in the network for SNMP queries as well as traps.
Technical documentation for all Fortinet appliances and software can be located at http://doc.fortinet.com.
Scope of Document
All of the recommendations provided are specifically based upon the latest 4.3.x firmware release
2.
Fortinet MIBs
The FortiGate SNMP agent supports Fortinet proprietary MIBs as well as RFCs 1213 and 2665. The support for
these RFCs includes parts of RFC 2665 (Ethernet-like MIB) and those elements of RFC 1213 (MIB II) that apply to
the FortiGate unit configuration.
There are two MIB files for all FortiGate appliances;
The Fortinet CORE MIB contains traps, fields and information that are common to all Fortinet
products.
The FortiGate MIB contains traps, fields and information that are specific to FortiGate units. Each
Fortinet appliance has its own MIB file.
You can download these two MIB files via the Support Portal. Log-in the Support portal with username and
password is needed.
https://support.fortinet.com/
On the Customer Service Support page - Click on Download - On the firmware Images Page click on the device
you need the MIBs for. In this case Fortigate click on the version V4.00 then CORE MIB
www.fortinet.com
Page | 3
SNMP
Monitoring
For more information on how to download the MIB files look at Knowledge Base (KB)
http://kb.fortinet.com
These articles are a good start.
http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=11607&sliceId=1&do
cTypeID=DT_KCARTICLE_1_1&dialogID=39332098&stateId=0%200%2039330427
http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD30891&sliceId=1&
docTypeID=DT_KCARTICLE_1_1&dialogID=39332098&stateId=0%200%2039330427
Your SNMP manager may already include standard and private MIBs in a compiled database. If this is not the
case you need to download and compile the standard MIB2 files. Afterwards you will need to add the Fortinet
Core and proprietary MIBs to this database to view Fortinet specific information
SNMPv3 with authentication and security level defined will assure encryption of the SNMP queries and replies
Description
The propriety Fortinet MIB includes all system
configuration and trap information that is common to all
Fortinet products.
Your SNMP manager requires this information to monitor
FortiGate unit configuration settings and receive traps
from the FortiGate SNMP agent.
FORTINET-FORTIGATE-MIB.mib
3.
FortiGate Traps
An SNMP manager can request information from the FortiGates SNMP agent, or the SNMP agent can send
traps when certain pre-defined events occur.
www.fortinet.com
Page | 4
SNMP
Monitoring
To receive FortiGate device SNMP traps, you must load and compile the FORTINETCORE- MIB and FORTINETFORTIGATE-MIB into your SNMP manager. All traps sent include the trap message as well as the FortiGate unit
serial number (fnSysSerial) and hostname (sysName).
The tables in this section include information about SNMP traps and variables. These tables have been included
to help you locate the object identifier number (OID), trap message, and trap description of the Fortigate trap
or variable you require.
The name of the table indicates if the trap is located in the Fortinet MIB or the FortiGate MIB. The Trap
Message column includes the message included with the trap as well as the SNMP MIB field name to help
locate information concerning the trap.
Traps starting with fn such as fnTrapCpuThreshold are defined in the Fortinet MIB. Traps starting with fg such
as fgTrapAvVirus are defined in the FortiGate MIB.
The object identifier (OID) is made up of the number at the top of the table with the index then added at the
end. For example if
- the OID is 1.3.6.1.4.1.12356.1.3.0 and the index is 4
- the full OID is 1.3.6.1.4.1.12356.1.3.0.4
The OID and the name of the object allow SNMP managers to refer to the specific fields and traps from the
Fortinet and FortiGate MIBs.
Indented rows are fields that are part of the message or table associated with the preceding row.
The following tables are defined:
Generic Fortinet traps (OID 1.3.6.1.4.1.12356.1.3.0)
System traps (OID 1.3.6.1.4.1.12356.1.3.0)
FortiGate VPN traps (OID 1.3.6.1.4.1.12356.1.3.0)
FortiGate HA traps (OID 1.3.6.1.4.1.12356.1.3.0)
Generic Fortinet traps (OID 1.3.6.1.4.1.12356.1.3.0)
Index
Trap message
.1
ColdStart
.2
WarmStart
.3
LinkUp
.4
LinkDown
Description
Standard traps as described in RFC 1215
Trap message
CPU usage high (fnTrapCpuThreshold)
www.fortinet.com
Description
CPU usage exceeds 80%. This threshold can
be set in the CLI using config system snmp
sysinfo, set trap-high-cpu-threshold.
Page | 5
SNMP
Monitoring
(fnTrapMemThreshold)
Memory usage exceeds 90%. This threshold
can be set in the CLI using config system
snmp sysinfo, set trap-low-memorythreshold.
.102
Memory low
.103
(fnTrapLogDiskThreshold)
Log disk usage has exceeded the configured
threshold. Only available on devices with log
disks. This threshold can be set in the CLI
using config system snmp sysinfo, set traplog-full-threshold.
.104
(fnTrapTempHigh)
A temperature sensor on the device has
exceeded its threshold. It should be noted
that not all devices have thermal sensors,
you need to verify the manual for
specifications
105
(fnTrapVoltageOutOfRange)
Power levels have fluctuated outside of
normal levels. Not all devices have voltage
monitoring instrumentation.
.106
(fnTrapPowerSupplyFailure)
Power supply failure detected. Available on
some devices which support redundant
power supplies.
.201
Interface IP change
(fnTrapIpChange)
The IP address for an interface has changed.
The trap message includes the name of the
interface, the new IP address and the serial
number of the Fortinet unit. You can use this
trap to track interface IP address changes
for interfaces with dynamic IP addresses set
using DHCP or PPPoE
www.fortinet.com
Page | 6
SNMP
Monitoring
Trap message
Description
.301
.302
Trap message
Description
.401
HA switch (fgTrapHaSwitch)
.402
.403
.404
HA Member Unavailable
(fgTrapHaMemberDown)
.405
HA Member Available
(fgTrapHaMemberUp)
(fgHaTrapMemberSerial)
www.fortinet.com
Page | 7
SNMP
Monitoring
4.
The FortiGate MIB contains fields which give access to FortiGate status information. The tables below list the
names of the MIB fields and describe the status information available for each one.
You can view more details about the information available for all FortiGate MIB fields by compiling the
FORTINET-CORE-MIB.mib and FORTINETFORTIGATE- MIB.mib files into your SNMP manager and browsing the
MIB fields on your computer.
To help locate a field, the object identifier (OID) number for each table of fields has been included. The OID
number for a field is that fields position within the table, starting at 0.
For example fnSysVersion has an OID of 1.3.6.1.4.1.12356.2.
The following tables include
FortiGate HA MIB Information fields (OID 1.3.6.1.4.1.12356.101.13.1)
FortiGate HA unit stats fields (OID 1.3.6.1.4.1.12356.101.13.2)
FortiGate Administrator accounts (OID 1.3.6.1.4.1.12356.101)
FortiGate Virtual domains (OID 1.3.6.1.4.1.12356.101.3.1)
FortiGate Virtual domain table entries (OID 1.3.6.1.4.1.12356.101.3.2.1.1)
FortiGate Active IP sessions table (OID 1.3.6.1.4.1.12356.101.11.2.1.1)
FortiGate Firewall policy statistics table (OID 1.3.6.1.4.1.12356.101.5.1.2.1.1)
FortiGate Dialup VPN peers (OID 1.3.6.1.4.1.12356.101.12.2.1.1)
FortiGate VPN Tunnel table (OID 1.3.6.1.4.1.12356.101.12.2.2.1)
Index
MIB field
Description
.1
fgHaSystemMode
High-availability mode
(Standalone, A-A or A-P).
.2
fgHaGroupId
.3
fgHaPriority
.4
fgHaOverride
.5
fgHaAutoSync
.6
fgHaSchedule
.7
fgHaGroupName
.8
fgHaTrapMemberSerial
.1
MIB field
Description
fgHaStatsTable
fgHaStatsIndex
www.fortinet.com
Page | 8
SNMP
Monitoring
.2
fgHaStatsSerial
.3
fgHaStatsCpuUsage
.4
fgHaStatsMemUsage
.5
fgHaStatsNetUsage
.6
fgHaStatsSesCount
.7
fgHaStatsPktCount
.8
fgHaStatsByteCount
.9
fgHaStatsIdsCount
.10
fgHaStatsAvCount
.11
fgHaStatsHostname
MIB field
Description
.1
fgAdminIdleTimeout
.2
fgAdminLcdProtection
fgAdminTable
MIB field
Description
fgVdInfo
.1
fgVdNumbe
.2
fgVdMaxVdoms
.3
fgVdEnabled
MIB field
fgVdTable.fgVdEntry
www.fortinet.com
Description
Table of information about each virtual
domaineach virtual domain has an
Page | 9
SNMP
Monitoring
fgVdEntIndex
.2
fgVdEntName
.3
fgVdEntOpMode
MIB field
fgIpSessIndex
.2
fgIpSessProto
.3
fgIpSessFromAdd
.4
fgIpSessFromPort
.5
fgIpSessToAddr
.6
fgIpSessToPort
.7
fgIpSessExp
.8
fgIpSessVdom
fgIpSessStatsTable
fgIpSessStatsEntry.
fgIpSessNumber
Description
The index number of the IP session within the
fgIpSessTable table
The IP protocol the session is using (IP, TCP,
UDP, etc.).
The source IPv4 address of the active IP
session.
The source port of the active IP session (UDP
and TCP only).
The destination IPv4 address of the active IP
session.
The destination port of the active IP session
(UDP and TCP only).
The number of seconds remaining until the
sessions expires (if idle).
Virtual domain the session is part of.
Corresponds to the index in fgVdTable.
IP Session statistics table for the virtual
domain.
Total sessions on this virtual domain.
(OID 1.3.6.1.4.1.12356.101.11.2.1.2.1.1)
.1
MIB field
fgFwPolicyStatsTable.fg
FwPolicyStatsEntry
fgFwPolicyID
.2
fgFwPolicyPktCount
.3
fgFwPolicyByteCount
www.fortinet.com
Description
Entries in the table for firewall policy statistics
on a virtual domain
Firewall policy ID. Only enabled policies are
available for querying. Policy IDs are only
unique within a virtual domain.
Number of packets matched to policy (passed
or blocked, depending on policy action). Count
is from the time the policy became active.
Number of bytes matched to policy (passed or
blocked, depending on the policy action). The
count is from the time the policy became
active.
P a g e | 10
SNMP
Monitoring
MIB field
fgVpnDialupIndex
.2
.3
.4
fgVpnDialupGateway
fgVpnDialupLifetime
fgVpnDialupTimeout
.5
.6
.7
.8
fgVpnDialupSrcBegin
fgVpnDialupSrcEnd
fgVpnDialupDstAddr
fgVpnDialupVdom
.9
.10
fgVpnDialUpInOctets
fgVpnDialUpOutOctets
Description
An index value that uniquely identifies an VPN
dial-up peer in the table
The remote gateway IP address on the tunnel.
VPN tunnel lifetime in seconds.
Time remaining until the next key exchange
(seconds) for this tunnel.
Remote subnet address of the tunnel.
Remote subnet mask of the tunnel.
Local subnet address of the tunnel.
The virtual domain this tunnel is part of. This
index corresponds to the index in fgVdTable.
The number of bytes received over the tunnel.
The number of byes send over the tunnel.
Index
.1
MIB field
fgVpnTunEntIndex
.2
fgVpnTunEntPhase1Name
.3
fgVpnTunEntPhase2Name
.4
fgVpnTunEntRemGwyIp
.5
fgVpnTunEntRemGwyPort
.6
.7
fgVpnTunEntLocGwyIp
fgVpnTunEntLocGwyPort
.8
fgVpnTunEntSelectorSrcBeginIp
.9
fgVpnTunEntSelectorSrcEndIp
.10
.11
fgVpnTunEntSelectorSrcPort
fgVpnTunEntSelectorDstBeginIp
.12
fgVpnTunEntSelectorDstEndIp
.13
.14
.15
fgVpnTunEntSelectorDstPort
fgVpnTunEntSelectorProt
fgVpnTunEntLifeSecs
.16
fgVpnTunEntLifeBytes
.17
.18
.19
.20
fgVpnTunEntTimeout
fgVpnTunEntInOctets
fgVpnTunEntOutOctets
fgVpnTunEntStatus
www.fortinet.com
Description
An index value that uniquely identifies a VPN
tunnel within the VPN tunnel table.
The descriptive name of the Phase1
configuration for the tunnel.
The descriptive name of the Phase2
configuration for the tunnel.
The IP of the remote gateway used by the
tunnel.
The port of the remote gateway used by the
tunnel, if it is UDP
The IP of the local gateway used by the tunnel
The port of the local gateway used by the
tunnel, if it is UDP.
Beginning of the address range of the source
selector.
Ending of the address range of the source
selector.
Source selector port.
Beginning of the address range of the
destination Selector
Ending of the address range of the destination
selector.
Destination selector port.
Protocol number for the selector.
Lifetime of the tunnel in seconds, if time
based lifetime is used.
Lifetime of the tunnel in bytes, if byte transfer
based lifetime is used.
Timeout of the tunnel in seconds.
Number of bytes received on the tunnel.
Number of bytes sent out on the tunnel.
Current status of the tunnel - either up or
P a g e | 11
SNMP
Monitoring
.21
5.
fgVpnTunEntVdom
down.
Virtual domain the tunnel belongs to. This
index corresponds to the index used in
fgVdTable.
.1.3.6.1.2.1.2.2.1.14
.1.3.6.1.2.1.2.2.1.13
.1.3.6.1.2.1.2.2.1.19
.1.3.6.1.2.1.2.2.1.20
ssl.root
vlan1
vlan2 <====
Deleted
Name/OID:
Name/OID:
ssl.root
vlan2 <====
RFC1213-MIB.iso.org.dod.internet.mgmt.mib-2
ifInOctets
ifOutoctets
.1.3.6.1.2.1.2.2.1.10
.1.3.6.1.2.1.2.2.1.1
CPU Usage
Many of the FortiGate appliances have more than one CPU it is therefore important to monitor each Processor.
The SNMP query to issue to identify the number of CPUs in the device
Number of processors : FORTINET-FORTIGATE-MIB.iso.org.dod.internet
fgProcessorCount
www.fortinet.com
.1.3.6.1.4.1.12356.101.4.4.1.0
P a g e | 12
SNMP
Monitoring
Example
1.3.6.1.4.1.12356.101.4.4.2.1.2.1 => CPU0 usage average over the last minute
1.3.6.1.4.1.12356.101.4.4.2.1.2.2 => CPU1 usage average over the last minute
1.3.6.1.4.1.12356.101.4.4.2.1.2.3 => CPU2 usage average over the last minute
1.3.6.1.4.1.12356.101.4.4.2.1.2.4 => CPU3 usage average over the last minute
Or if more accuracy is required the average over the last 5 seconds can be polled
1.3.6.1.4.1.12356.101.4.4.2.1.3.1 => CPU0 usage average over the last 5 seconds
1.3.6.1.4.1.12356.101.4.4.2.1.3.2 => CPU1 usage average over the last 5 seconds
1.3.6.1.4.1.12356.101.4.4.2.1.3.3 => CPU2 usage average over the last 5 seconds
1.3.6.1.4.1.12356.101.4.4.2.1.3.4 => CPU3 usage average over the last 5 seconds
Suggested KPI: Max 70 % for each CPU during peak traffic duration with possible spikes of more than 90% not
longer than 4 seconds
Memory Usage
The memory of the FortiGate is divided into zones there is a high memory and low memory zone. All kernel
data structures are located in the low memory zone. Usage information is available for Overall memory and
Low memory. Regular conserve mode is triggered when the overall memory is getting low. It could be a
process that consumes too much memory (rate case) or high usage of the shared memory buffers. Kernel
conserve mode is triggered when the amount of Low memory is getting to low.
Please refer to this document for more information
http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD33103&sliceId=1&
docTypeID=DT_KCARTICLE_1_1&dialogID=39636481&stateId=0%200%2039638350
FORTINET-FORTIGATE-MIB.iso.org.dod.internet
www.fortinet.com
P a g e | 13
SNMP
Monitoring
Overall Memory
fgSysMemUsage
fgSysMemCapacity
.1.3.6.1.4.1.12356.101.4.1.4.0
.1.3.6.1.4.1.12356.101.4.1.5.0
.1.3.6.1.4.1.12356.101.4.1.9.0
.1.3.6.1.4.1.12356.101.4.1.10.0
The device will enter the Kernel conserve mode when there is 20% of Low Total left
Suggested KPI : 65% of constant Low memory usage
Concurrent sessions
FORTINET-FORTIGATE-MIB.iso.org.dod.internet
fgSysSessCount
.1.3.6.1.4.1.12356.101.4.1.8.0
Suggested KPI : 70% of the Product data sheet for the specific model
HA Information
FORTINET-FORTIGATE-MIB.iso.org.dod.internet
fgHaStatsSerial
.1.3.6.1.4.123456.101.13.2.1.1.1.2.1
fgHaStatsHostname
.1.3.6.1.4.1.12356.101.13.2.1.1.11
fgHaStatsMemusage
.1.3.6.1.4.1.12356.101.13.2.1.1.4
fgHaStatsSessCount
.1.3.6.1.4.1.12356.101.13.2.1.1.6
fgHAStatsPktCount
.1.3.6.1.4.1.12356.101.13.2.1.1.7
fgHaStatsNetUsage
.1.3.6.1.4.1.12356.101.13.2.1.1.5
6.
www.fortinet.com
P a g e | 14
SNMP
Monitoring
<fgt_serial> is the serial number of any cluster unit. For example FGT4002803033172. You can specify the serial
number of any unit in the cluster, including the primary unit, to get information from the specified unit.
<address_ipv4> is the IP address of the FortiGate interface that the SNMP manager connects to.
<oid> is the object identifier for the MIB field.
If the specified serial number matches the serial number of a subordinate unit, the SNMP get request is sent
over the HA heartbeat link to the subordinate unit. After processing the request, the subordinate unit sends
the reply back over the HA heartbeat link back to the primary unit. The primary unit then forwards the
response back to the SNMP manager.
If the serial number matches the serial number of the primary unit, the SNMP get request is processed by the
primary unit. You can actually add a serial number to the community name of any SNMP get request
The second method to monitor both the Master and the Slave in a HA configuration is to configure a HA-mgmt
interface. In order to enable the slave to reply to SNMP queries a different IP address and administrative access
should be configured on an interface for each unit in the cluster.
To monitor each cluster unit using SNMP, just add the IP address of each cluster units reserved management
interface to the SNMP server configuration. If your SNMP configuration includes SNMP users with user names
and passwords you must also enable HA direct management for all SNMP users. Enable direct management of
cluster members in the cluster SNMP configuration
Config system ha
set ha-mgmt-status enable
set ha-mgmt-interface <interface-name>
set ha-mgmt-interface-gateway x.x.x.x
end
The reserved management interface default route is not synchronized to other cluster units.
http://kb.fortinet.com/kb/microsites/search.do?cmd=displayKC&docType=kc&externalId=FD32214&sliceId=1&
docTypeID=DT_KCARTICLE_1_1&dialogID=39336444&stateId=0%200%2039334829
For both methods one needs to enable SNMP on an Interface.
config system interface
edit "portx"
set vdom "Management Vdom normally root"
set ip x.x.x.x/y.y.y.y
set allowaccess snmp
www.fortinet.com
P a g e | 15
SNMP
Monitoring
www.fortinet.com
P a g e | 16
SNMP
Monitoring
P a g e | 17
SNMP
Monitoring
Suggestion is to use SNMPv3. Configure SNMPv3 queries and Traps via CLI .
config system snmp user
edit "test"
set events cpu-high mem-low log-full intf-ip vpn-tun-up vpn-tun-down ha-switch ha-hb-failure ha-member-up
ha-member-down ent-conf-change
set ha-direct enable
set notify-hosts 192.168.171.233
unset notify-hosts6
set queries enable
set query-port 161
set security-level auth-priv
set auth-proto md5
set auth-pwd ENC AAB2AphhIsKSFeoOXvxLrIeJrsVEzv1c51V8uWdMqa/0DREWJXn8lpo
mdLlz5kaGA4g6IQEa0uH7PTvk9fUe1T+LLX08v3mLs5DQQ0I7u/aonp+m
set priv-proto des
set priv-pwd ENC AAB2AphhIsKSFeoOXvxLrIeJrsVEzv1c51V8uWdMqa/0DREWcofB0K1
C8Iz10uH+gWsa10jyW9zde+vdW/dkRBhZKycIIayJ8K/ru+byx91q+dzA
next
end
www.fortinet.com
P a g e | 18
SNMP
Monitoring
7.
Description
This Fortinet-proprietary MIB enables your
SNMP manager to query for system
information and to receive traps that are
common to multiple Fortinet devices.
Except:
There is no support for the EGP group from
MIB II (RFC 1213, section 3.11 and 6.10).
Protocol statistics returned for MIB II groups
(IP, ICMP, TCP, UDP, etc.) do not accurately
capture all FortiAnalyzer traffic activity. More
accurate information can be obtained from the
information reported by the FortiAnalyzer MIB.
8.
FortiAnalyzer SNMP is read-only: SNMP v1/2 and v3 compliant SNMP managers have read-only access to
FortiAnalyzer system information and can receive FortiAnalyzer traps. RFC support includes most of RFC 2665
(Ethernet-like MIB) and most of RFC 1213 (MIB II). FortiAnalyzer units also use object identifiers from the
Fortinet proprietary MIB.
P a g e | 19
SNMP
Monitoring
ifInErrors
ifInDiscards
ifOutDiscards
ifOutErrors
.1.3.6.1.2.1.2.2.1.14
.1.3.6.1.2.1.2.2.1.13
.1.3.6.1.2.1.2.2.1.19
.1.3.6.1.2.1.2.2.1.20
Traffic
RFC1213-MIB.iso.org.dod.internet.mgmt.mib-2
IfInOctets
.1.3.6.1.2.1.2.2.1.10
IfOutOctets
.1.3.6.1.2.1.2.2.1.16
CPU Usage
FORTINET-FORTIANALYZER-MIB.iso.org.dod.internet.private.enterprises.fortinet
Fa300SysCpuUsage
.1.3.6.1.4.1.12356.102.99.2.3.0
Suggested KPI : Max 70 % for CPU during peak traffic duration with possible spikes of more than 90% not
longer than 4 seconds
Memory Usage
FORTINET-FORTIANALYZER-MIB.iso.org.dod.internet.private.enterprises.fortinet
Fa300SysmemCapacity
.1.3.6.1.4.1.12356.102.99.2.8.0
Fa300SysmemUsage
.1.3.6.1.4.1.12356.102.99.2.4.0
Suggested KPI : Max 70 % during peak usage
Session Count
FORTINET-FORTIANALYZER-MIB.iso.org.dod.internet.private.enterprises.fortinet
Fa300SysSesCount
.1.3.6.1.4.1.12356.102.99.2.5.0
Fa300IpSessProto
.1.3.6.1.4.1.12356.102.2.2.1.1.2.1
Suggested KPI : Max 70 % during peak usage
Disk Usage
FORTINET-FORTIANALYZER-MIB.iso.org.dod.internet.private.enterprises.fortinet
Fa300SysDiskCapacity
.1.3.6.1.4.1.12356.102.99.2.6.0
Fa300SysDiskUsage
.1.3.6.1.4.1.12356.102.99.2.7.0
Suggested KPI: Max 70% of usable disk space
www.fortinet.com
P a g e | 20
SNMP
Monitoring
9.
www.fortinet.com
P a g e | 21
SNMP
Monitoring
config hosts
edit 1
set ip 192.168.171.233
next
end
set events cpu-high mem-low log-full intf-ip vpn-tun-up vpn-tun-down system_event raid
next
end
config system snmp sysinfo
set agent enable
end
Suggestion is to use SNMPv3 Queries and Traps. The CLI configuration as follows
config system snmp user
edit "test"
set notify-hosts 172.168.171.233
set events cpu-high mem-low log-full intf-ip vpn-tun-up vpn-tun-down sys
tem_event raid power-supply-failure power-supply-restored log-rate data-rate
set security-level auth-priv
set auth-proto md5
set auth-pwd ENC ablUWJq0vyNlybw2fUQokvwMFNekxjcGZfWAiQwHuqHuEOGUTyn7Wup
APVeDTdCL
set priv-proto des
set priv-pwd ENC eddcb0vcdKAABeOzhte0J1780Q9mhoa2H40SRalqEYWRIh+gOMd82lg
CdbDV2LGe
next
end
www.fortinet.com
P a g e | 22
SNMP
Monitoring
http://docs.fortinet.com/fa/fortianalyzer-admin-40-mr3.pdf
SNMP must be configured for this to work. (Chapter 9)
The following example shows how one can send traps with a FortiAnalyzer for interface status changes on a
Fortigate:
Under System -> Config -> Log-based Alerts:
www.fortinet.com
P a g e | 23
SNMP
Monitoring
MIB or RFC
FORTINET-CORE-MIB
FORTINETFORTIMANAGERMIB.mib
Description
This Fortinet-proprietary MIB enables your
SNMP manager to query for system
information and to receive traps that are
common to multiple Fortinet devices.
RFC-2665 (EthernetlikeMIB)
The Fortinet SNMP agent supports Ethernetlike MIB information with the following
exception. No support for the dot3Tests and
dot3Errors groups.
P a g e | 24
SNMP
Monitoring
One can find more information on how to download the MIB files in Knowledge Base (KB)
http://kb.fortinet.com
Traffic
RFC1213-MIB.iso.org.dod.internet.mgmt.mib-2
IfInOctets
.1.3.6.1.2.1.2.2.1.10
IfOutOctets
.1.3.6.1.2.1.2.2.1.16
CPU Usage
fnFortiManagerMib.fmSystem.fmSystemInfo
fmSysCpuUsage
.1.3.6.1.4.1.12356.103.2.1.1
Suggested KPI : Max 70 % for each CPU during peak traffic duration with possible spikes of more than 90% not
longer than 4 seconds
www.fortinet.com
P a g e | 25
SNMP
Monitoring
www.fortinet.com
P a g e | 26
SNMP
Monitoring
www.fortinet.com
P a g e | 27
SNMP
Monitoring
Appendix A:
Recommended KPI
Description
Physical Errors per Interface
CPU usage
Number of sessions
Memory usage
Disk usage
www.fortinet.com
Recommended KPI
Less than 1% of total traffic
Not more than 70% of CPU capacity
Less than 70% of the datasheet
Less than 70% of memory capacity
Less than 70% of disk capacity
P a g e | 28